Cyber-attacks more likely than water crises, as serious as pollution: WEF

Cyber-attacks have outrated nearly every other type of threat in a risk assessment published by the World Economic Forum, reiterating the importance of proactive security measures over the next 10 years.

The <i>Global Risks 2012</i> report evaluated a range of risk factors to arrive at some assumptions about the types of risks organisations will face over the next decade. While there weren't as many technological risks identified as economic, environmental, geopolitical or societal risks, those that made the list were seen as significant.

Cyber-attacks were seen to be as risky as systemic corruption, mismanaged urbanisation and nearly as risky as terrorism, food shortages and recurring liquidity crises. They were also gauged to be the fourth most-likely risk factor out of 50 analysed, making them just slightly less likely than rising greenhouse gas emissions and on par with water supply crises.

Also recognised in the analysis were technological risks such as critical systems failure – which was considered to have as high an impact as terrorism and weapons of mass destruction, and nearly as bad as a major systemic financial failure.

The report collates the responses of 469 experts from industry, government, academia and civil society, and arranges the various risk factors in a relative matrix to paint an overall picture of technological and other types of threats.

By looking at the overall threat picture in this way, the report was able to pick out three of what it calls "constellations of risks": the 'seeds of dystopia', ' how safe are our safeguards?' and 'The dark side of connectivity'.

"The constellation of risks arising from emerging technologies, financial interdependence, resource depletion and climate change exposes the weak and brittle nature of existing safeguards," the report warns. "Our safeguards may no longer be fit to manage vital resources and ensure orderly markets and public safety."

That one of the three key scenarios should revolve around connectivity and technology, reflects the growing role that such ecosystems are playing in broader risk scenarios. At the centre of the risk scenario is the risk of critical systems failure, which is seen as the linchpin of other serious technological events.

"Hyper-connectivity is a reality," the report's authors warn. "With over five billion mobile phones coupled with internet connectivity and cloud-based applications, daily life is more vulnerable to cyber threats and digital disruptions…. Online security is now considered a public good, implying an urgent need to encourage greater private sector engagement to reduce the vulnerability of key information technology systems."

Interestingly, another technological-related risk that ranked highly in the 2007 survey – Breakdown of Critical Information Infrastructure – had dropped out of the top five this year, supplanted by financial imbalances, greenhouse gas emissions, water supply crises, cyber-attacks and other risks.

This suggests a growing confidence in the remediation efforts of cyber-security authorities – or growing complacency by the surveyed experts, who tended to rank technological risks as being of lower impact and likelihood than non-technology assessments.

Follow @CSO_Australia and sign up to the CSO Australia newsletter.


Register Today. 

Consumerisation is inevitable.. So how secure is your data?

Hear from Rob Livingstone, Michael Barnes, Steve Quane and Dave Asprey amongst others on the Evolution. Trends, Solutions and the Future of Cloud Security, limited seats register today through CSO.

Join the CSO newsletter!

Error: Please check your email address.
Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by David Braue

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place